{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T20:57:06Z","timestamp":1765486626030,"version":"3.37.3"},"reference-count":37,"publisher":"Wiley","license":[{"start":{"date-parts":[[2021,6,3]],"date-time":"2021-06-03T00:00:00Z","timestamp":1622678400000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Key R&D Program of China","award":["2017YFB1400700","62072487","M21036","2020LD01"],"award-info":[{"award-number":["2017YFB1400700","62072487","M21036","2020LD01"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2017YFB1400700","62072487","M21036","2020LD01"],"award-info":[{"award-number":["2017YFB1400700","62072487","M21036","2020LD01"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004826","name":"Natural Science Foundation of Beijing Municipality","doi-asserted-by":"publisher","award":["2017YFB1400700","62072487","M21036","2020LD01"],"award-info":[{"award-number":["2017YFB1400700","62072487","M21036","2020LD01"]}],"id":[{"id":"10.13039\/501100004826","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Statistical Science Foundation of China","award":["2017YFB1400700","62072487","M21036","2020LD01"],"award-info":[{"award-number":["2017YFB1400700","62072487","M21036","2020LD01"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2021,6,3]]},"abstract":"<jats:p>Traditional identity authentication solutions mostly rely on a trusted central entity, so they cannot handle single points of failure well. In addition, most of these traditional schemes need to store a large amount of identity authentication or public key information, which makes the schemes difficult to expand and use in distributed situations. In addition, the user prefers to protect the privacy of their information during the identity verification process. Due to the open and decentralized nature of the blockchain, the existing identity verification schemes are difficult to apply well in the blockchain. To solve this problem, in this article, we propose a privacy protection identity authentication scheme based on the blockchain. The user independently generates multiple-identity information, and these identities can be used to apply for an identity certificate. Authorities use the ECDSA signature algorithm and the RSA encryption algorithm to complete the distribution of the identity certificate based on the identity information and complete the registration of identity authentication through the smart contract on the blockchain. On the one hand, it can realize the protection of real identity information; on the other hand, it can avoid the storage overhead caused by the need to store a large number of certificates or key pairs. Due to the use of the blockchain, there is no single point of failure in the authentication process, and it can be applied to distributed scenarios. The security and performance analysis show that the proposed scheme can meet security requirements and is feasible.<\/jats:p>","DOI":"10.1155\/2021\/9992353","type":"journal-article","created":{"date-parts":[[2021,6,4]],"date-time":"2021-06-04T18:57:42Z","timestamp":1622833062000},"page":"1-10","source":"Crossref","is-referenced-by-count":22,"title":["A Privacy-Preserving Identity Authentication Scheme Based on the Blockchain"],"prefix":"10.1155","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8118-411X","authenticated-orcid":true,"given":"Sheng","family":"Gao","sequence":"first","affiliation":[{"name":"School of Information, Central University of Finance and Economics, Beijing 100086, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4269-6718","authenticated-orcid":true,"given":"Qianqian","family":"Su","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0002-5593","authenticated-orcid":true,"given":"Rui","family":"Zhang","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China"}]},{"given":"Jianming","family":"Zhu","sequence":"additional","affiliation":[{"name":"School of Information, Central University of Finance and Economics, Beijing 100086, China"}]},{"given":"Zhiyuan","family":"Sui","sequence":"additional","affiliation":[{"name":"School of Information, Central University of Finance and Economics, Beijing 100086, China"}]},{"given":"Junsheng","family":"Wang","sequence":"additional","affiliation":[{"name":"State Grid Blockchain Technology Laboratory, State Grid E-Commerce Co., Ltd., Beijing 100053, China"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2020.3008896"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2020.3017377"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/mnet.011.1900634"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/mwc.001.1900463"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2018.2842773"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.3047960"},{"first-page":"17","article-title":"Developing an e-health system based on IoT, fog and cloud computing","author":"K. Monteiro","key":"7"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/access.2018.2817615"},{"key":"9","first-page":"1","article-title":"Blockchain for future smart grid: a comprehensive survey","volume":"9","author":"M. B. Mollah","year":"2020","journal-title":"IEEE Internet of Things Journal"},{"issue":"10","key":"10","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11432-019-2858-8","article-title":"An incentive-compatible rational secret sharing scheme using blockchain and smart contract","volume":"64","author":"Z. Chen","year":"2021","journal-title":"Science China Information Sciences"},{"key":"11","doi-asserted-by":"crossref","first-page":"17\u2009545","DOI":"10.1109\/ACCESS.2018.2805837","article-title":"A blockchain based privacy-preserving incentive mechanism in crowdsensing applications","volume":"6","author":"J. Wang","year":"2018","journal-title":"IEEE Access"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.2965975"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/tsc.2020.2964537"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2948068"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2986041"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/tvlsi.2019.2929420"},{"key":"17","first-page":"9","article-title":"A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks","volume":"82","author":"F. Wu","year":"2017","journal-title":"Future Generation Computer Systems"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2018.2838136"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/tcc.2015.2404816"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.06.011"},{"key":"21","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1016\/j.cose.2018.06.004","article-title":"Bubbles of trust: a decentralized blockchain-based authentication system for IoT","volume":"78","author":"M. T. Hammi","year":"2018","journal-title":"Computers and Security"},{"first-page":"676","article-title":"User privacy-preserving scheme based on anonymous authentication in smart grid","author":"Q. Lai","key":"22"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-013-9948-1"},{"key":"24","first-page":"118","article-title":"Ensuring users privacy and mutual authentication in opportunistic networks: a survey","volume":"22","author":"C. B. Avoussoukpo","year":"2019","journal-title":"International Journal of Network Security"},{"first-page":"87","article-title":"An efficient blockchain authentication scheme for vehicular ad-hoc networks","author":"M. Wagner","key":"25"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2018.12.002"},{"first-page":"83","article-title":"Preservation authentication and authorization on blockchain","author":"W. A. Ali","key":"27"},{"key":"28","doi-asserted-by":"crossref","first-page":"41\u2009678","DOI":"10.1109\/ACCESS.2019.2904300","article-title":"An efficient authentication scheme for blockchain-based electronic health records","volume":"7","author":"F. Tang","year":"2019","journal-title":"IEEE Access"},{"key":"29","doi-asserted-by":"crossref","first-page":"171\u2009771","DOI":"10.1109\/ACCESS.2020.3022429","article-title":"A permissioned blockchain-based identity management and user authentication scheme for e-health systems","volume":"8","author":"X. Xiang","year":"2020","journal-title":"IEEE Access"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2863956"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/taes.2018.2874151"},{"first-page":"145","article-title":"Variants of RSA and their cryptanalysis","author":"K. Balasubramanian","key":"32"},{"first-page":"173","article-title":"A survey on cryptography: comparative study between RSA vs ECC Algorithms, and RSA vs El-Gamal algorithms","author":"F. Mallouli","key":"33"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2473820"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1109\/twc.2010.092410.090022"},{"first-page":"1","article-title":"A user authentication scheme of IoT devices using blockchain-enabled fog nodes","author":"R. Almadhoun","key":"36"},{"key":"37","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4842-6586-4_8","volume-title":"Cryptography Libraries in C\/C++20","author":"M. I. Mihailescu","year":"2021"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/9992353.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/9992353.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/9992353.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,29]],"date-time":"2022-12-29T23:13:18Z","timestamp":1672355598000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2021\/9992353\/"}},"subtitle":[],"editor":[{"given":"James","family":"Ying","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,6,3]]},"references-count":37,"alternative-id":["9992353","9992353"],"URL":"https:\/\/doi.org\/10.1155\/2021\/9992353","relation":{},"ISSN":["1939-0122","1939-0114"],"issn-type":[{"type":"electronic","value":"1939-0122"},{"type":"print","value":"1939-0114"}],"subject":[],"published":{"date-parts":[[2021,6,3]]}}}